• Group 05-51 | SRP Intern | Cyber-Physical Systems…

    MIT Lincoln Laboratory (Lexington, MA)
    …affected by, the physical world. The Cyber-Physical Systems Group conducts research to understand the cybersecurity implications of these cyber-physical phenomena ... convergence of cybersecurity and the physical world in an interdisciplinary research and development environment. We focus on cyber-physical sensing, cyber-physical… more
    MIT Lincoln Laboratory (12/16/25)
    - Related Jobs
  • Bioinformatician and Data Infrastructure Lead

    Beth Israel Lahey Health (Boston, MA)
    …applies cutting-edge genomic and computational approaches to understand resilience and vulnerability in neurodegenerative disease. We seek a Bioinformatician / Data ... reproducibility, and develop integrative analytic frameworks that support high-impact research , grant submissions, and translational discovery. The bioinformatician will… more
    Beth Israel Lahey Health (12/04/25)
    - Related Jobs
  • Executive Director Of Coordinated Entry…

    City of New York (New York, NY)
    …data from multiple systems, informed by stakeholder feedback or data analysis from research staff and development of reports with recommendations for the purpose of ... PACT staff and community stakeholders. Also, be responsible for the design of a vulnerability index (using data from a variety of automated systems) that will serve… more
    City of New York (01/14/26)
    - Related Jobs
  • Principal Information Security Officer - Mellon…

    Carnegie Mellon University (Pittsburgh, PA)
    Carnegie Mellon University is a private, global research university that stands among the world's most renowned education institutions. With ground-breaking brain ... your journey starts here! The Pittsburgh Supercomputing Center (PSC) a joint research center of Carnegie Mellon University and the University of Pittsburgh, was… more
    Carnegie Mellon University (01/15/26)
    - Related Jobs
  • Systems Administrator Senior

    University of Michigan (Ann Arbor, MI)
    …the application process, email [email protected] . **Job Summary** TheSurvey Research Center (SRC) (https://src.isr.umich.edu/) within the Institute for Social ... Research (ISR) at the University of Michigan is seeking...+ Apply security best practices, including system hardening, patching, vulnerability remediation, and compliance support. + Contribute to infrastructure… more
    University of Michigan (01/15/26)
    - Related Jobs
  • SkillBridge - National Security

    Battelle Memorial Institute (Beavercreek, OH)
    …with technical and business teams in areas such as reverse engineering, vulnerability research , network engineering, software engineering, data science, hardware ... Battelle delivers when others can't. We conduct research and development, manage national laboratories, design and manufacture products and deliver critical services… more
    Battelle Memorial Institute (01/07/26)
    - Related Jobs
  • Full Spectrum Cyber Solutions SME

    General Dynamics Information Technology (Herndon, VA)
    …+ Expert in systems security architecture and design, 5+ years. + Expert in vulnerability research , 5+ years. + Experience in CNO/FSC/DCO, 5+ years. + Practical ... Risk Management. + Conducts software and systems engineering and software systems research to develop new capabilities, ensuring cybersecurity is fully integrated. +… more
    General Dynamics Information Technology (01/06/26)
    - Related Jobs
  • Occupational Health Force Specialist

    Alaka'ina Foundation Family of Companies (Dayton, OH)
    …to installation/incident commanders. DESCRIPTION OF RESPONSIBILITIES: + Provide SME research and development of Air Force Comprehensive Skills Training & ... Engineering Installation Medical All-hazards Response (IMAHR) readiness mission. + Research and develop advanced Deployment Health Preventive Medicine documents,… more
    Alaka'ina Foundation Family of Companies (01/01/26)
    - Related Jobs
  • Assistant Director - Access & Surveillance Systems

    Texas Tech University (Lubbock, TX)
    …with IT security teams to enforce segmentation, firmware updates, and vulnerability management for all security-related endpoints. + Vendor Management: Following TTU ... position is designated as involving access to critical infrastructure systems and/or research , as defined by Texas Executive Order GA-48. As such, candidates must… more
    Texas Tech University (12/22/25)
    - Related Jobs
  • Electromagnetic Warfare Intelligence Analyst…

    Huntington Ingalls Industries (Fort Shafter, HI)
    …a dynamic and innovative Electromagnetic Warfare Intelligence Analyst to provide research , analysis, and planning support to the US Indo-Pacific Command ... for USINDOPACOM and USARPAC senior leader consumption. You'll also provide research and analysis of various pertinent national security policies, military… more
    Huntington Ingalls Industries (12/06/25)
    - Related Jobs